KEYNOTE: The Power of Data Interchange to Investigate Application Attacks

Shape threat research recently partnered with one of our hospitality customers to investigate a mysterious case involving online bookings that were producing a spike in no-shows. An innovative automation attack was uncovered, impacting not only this customer, but a number of brands across the hospitality industry – including members of the RH-ISAC community. Shape brought […]

Read more

Keynote: Up Your Game With ATT&CK and SHIELD

In a session intended for cyber warriors, MITRE’s Chief Cyber Intel Strategist will brief the RH-ISAC on the new MITRE Shield active defense knowledgebase. This discussion will focus on how teams of all size/capability can effectively leverage the MITRE ATT&CK framework defining attacker behaviors and the newly published MITRE Shield active defense techniques derived from […]

Read more

KEYNOTE: Mission Critical: Lessons Learned from a Seasoned Army Vet

With a 33-year military career under her belt, US Army Lieutenant General Karen Gibson understands the tremendous value information sharing, collective analysis, and relationships play in defending our Nation. Having stood up the U.S. Cyber Command’s Joint Force Headquarters and the Army’s premiere offensive cyber organization, Karen has seen first-hand how critical threat intel operations […]

Read more

KEYNOTE: Tribal Knowledge: Sharing is Caring

There has never been a busier time to be an information security practitioner, and playbooks and manuals are simply not enough to be successful. With more than 20 years of working in cyber intelligence, Marcus Carey understands the value of information sharing and taking the time to listen and learn from your peers. In this […]

Read more

KEYNOTE: Driving Change to Create a More Diverse Workforce

In today’s social climate, many organizations are realizing that previously unacknowledged inequities and privilege have been barriers for truly creating an inclusive workforce. Addressing a lack of diversity within the cyber workforce is not a new problem, but now many leaders are being more intentional about how marginalized voices are promoted, heard and seen. This panel discussion showcases how cybersecurity leaders are […]

Read more

KEYNOTE: The Future of Application Security: Increased Revenue, Less User Friction

By some estimates, 2020 has seen as much as five years’ worth of digital transformation in just a few months. This is perhaps no more evident than in the retail and hospitality industries. As a result, there’s a tremendous amount of focus on streamlined user experiences, improving eCommerce conversion rates, and securing increasingly mission critical […]

Read more

KEYNOTE: Triple Threat: Three Predictions for where Cybercrime is Headed in 2021 and Beyond

Theresa knows a thing or two about pivoting on a dime and transforming people and technology to meet shifting, and often conflicting, priorities. From the server rooms of some of the biggest global banks to the Situation Room at the White House and now from inside the Fortune 500, she has a unique perspective on […]

Read more